Auto-Update: 2024-10-24T10:00:30.362974+00:00

This commit is contained in:
cad-safe-bot 2024-10-24 10:03:31 +00:00
parent 96f120ea1d
commit fc712a581b
8 changed files with 384 additions and 10 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10050",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-24T09:15:02.747",
"lastModified": "2024-10-24T09:15:02.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 1.6.43 via the hfe_template shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to view the contents of Draft, Private and Password-protected posts they do not own."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.43/inc/class-header-footer-elementor.php#L634",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3173344/header-footer-elementor/trunk/inc/class-header-footer-elementor.php?contextall=1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/662f6ae2-2047-4bbf-b4a6-2d536051e389?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-6049",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2024-10-24T08:15:02.297",
"lastModified": "2024-10-24T08:15:02.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a \"...\" (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt."
}
],
"metrics": {},
"weaknesses": [
{
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-32"
}
]
}
],
"references": [
{
"url": "https://lawo.com/lawo-downloads/",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
},
{
"url": "https://r.sec-consult.com/lawo",
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8667",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-24T08:15:02.430",
"lastModified": "2024-10-24T08:15:02.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HurryTimer \u2013 An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized post publication due to a missing capability check on the activateCampaign() function in all versions up to, and including, 2.10.0. This makes it possible for authenticated attackers, with contributor-level access and above, to publish arbitrary posts like ones they have submitted for review, or a site administrator has in draft."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/hurrytimer/trunk/includes/Admin.php#L568",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3173213/hurrytimer/trunk/includes/Admin.php?contextall=1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a8eda88-c45a-4867-b427-d63b586e6de3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8717",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-24T09:15:03.697",
"lastModified": "2024-10-24T09:15:03.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer \u2013 DearFlip plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pdf_source' parameter in all versions up to, and including, 2.3.32 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/3d-flipbook-dflip-lite/trunk/assets/js/dflip.min.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3172275/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d4c2944-28e8-4866-b4da-91cf12d9d115?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9531",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-24T08:15:02.663",
"lastModified": "2024-10-24T08:15:02.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mvx_sent_deactivation_request' function in all versions up to, and including, 4.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send a canned email to the site's administrator asking to delete the profile of an arbitrary vendor."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php#L3780",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php?contextall=1&old=3168957&old_path=%2Fdc-woocommerce-multi-vendor%2Ftrunk%2Fclasses%2Fclass-mvx-ajax.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5af1063c-615e-4196-9fa6-960c008544c4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-9943",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-24T08:15:02.920",
"lastModified": "2024-10-24T08:15:02.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.4. This is due to missing or incorrect nonce validation on several functions in api/class-mvx-rest-controller.php. This makes it possible for unauthenticated attackers to update vendor account details, create vendor accounts, and delete arbitrary users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L5258",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6009",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.1/api/class-mvx-rest-controller.php#L6155",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/api/class-mvx-rest-controller.php?old=3168957&old_path=dc-woocommerce-multi-vendor%2Ftrunk%2Fapi%2Fclass-mvx-rest-controller.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b950faf9-2122-42af-9f05-ec850767be32?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-24T08:00:37.566938+00:00
2024-10-24T10:00:30.362974+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-24T07:15:02.987000+00:00
2024-10-24T09:15:03.697000+00:00
```
### Last Data Feed Release
@ -33,16 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
266891
266897
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `6`
- [CVE-2024-40595](CVE-2024/CVE-2024-405xx/CVE-2024-40595.json) (`2024-10-24T06:15:11.703`)
- [CVE-2024-9864](CVE-2024/CVE-2024-98xx/CVE-2024-9864.json) (`2024-10-24T07:15:02.310`)
- [CVE-2024-9865](CVE-2024/CVE-2024-98xx/CVE-2024-9865.json) (`2024-10-24T07:15:02.987`)
- [CVE-2024-10050](CVE-2024/CVE-2024-100xx/CVE-2024-10050.json) (`2024-10-24T09:15:02.747`)
- [CVE-2024-6049](CVE-2024/CVE-2024-60xx/CVE-2024-6049.json) (`2024-10-24T08:15:02.297`)
- [CVE-2024-8667](CVE-2024/CVE-2024-86xx/CVE-2024-8667.json) (`2024-10-24T08:15:02.430`)
- [CVE-2024-8717](CVE-2024/CVE-2024-87xx/CVE-2024-8717.json) (`2024-10-24T09:15:03.697`)
- [CVE-2024-9531](CVE-2024/CVE-2024-95xx/CVE-2024-9531.json) (`2024-10-24T08:15:02.663`)
- [CVE-2024-9943](CVE-2024/CVE-2024-99xx/CVE-2024-9943.json) (`2024-10-24T08:15:02.920`)
### CVEs modified in the last Commit

View File

@ -242339,6 +242339,7 @@ CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073b
CVE-2024-10045,0,0,df53331c9b7607363b5960cd2fb00b418f72be4924f4b02eb17d04eadab916e2,2024-10-23T15:12:34.673000
CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
CVE-2024-10050,1,1,55c5bba40556ecc737d1aa079dbc3e132e33b426d8fb19831b21cb407e1a9932,2024-10-24T09:15:02.747000
CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000
CVE-2024-10057,0,0,d8a525e53057703eafafe41b97e25f6595177cb8b862a21217c338a0239a3d3c,2024-10-21T20:53:22.813000
CVE-2024-1006,0,0,fe82f3d0065ffa9f2a59eb5b63e144d9442dc24b73dc23626043d548cf903e88,2024-05-17T02:35:09.467000
@ -258057,7 +258058,7 @@ CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6
CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000
CVE-2024-40595,1,1,a181f13e8c06f281b39ef40cbf09da0370cf06e7de45b29ab6f71c694074e46e,2024-10-24T06:15:11.703000
CVE-2024-40595,0,0,a181f13e8c06f281b39ef40cbf09da0370cf06e7de45b29ab6f71c694074e46e,2024-10-24T06:15:11.703000
CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000
CVE-2024-40597,0,0,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000
CVE-2024-40598,0,0,de25c69f35558b8aca0a1bbf15e54892da14954831f161b4abaf3c33fd743682,2024-07-09T16:45:38.957000
@ -264134,6 +264135,7 @@ CVE-2024-6045,0,0,efe3be755dfb936847ff2e63b0d55993a7f058e00e5d0482b37d4da99ee942
CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc0680,2024-06-18T11:15:52.513000
CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000
CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000
CVE-2024-6049,1,1,4bc2edad010a7e13f7f5b27cdc70143c49c8438b46c0d3becb0b7d82b235b129,2024-10-24T08:15:02.297000
CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000
CVE-2024-6051,0,0,9740107b5da610f5b7276dc508ceaf0014cb04cfa38f8de362bc7a6604390684,2024-10-04T13:51:25.567000
CVE-2024-6052,0,0,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000
@ -266190,6 +266192,7 @@ CVE-2024-8662,0,0,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0
CVE-2024-8663,0,0,64dc4dfe7e82f016d11c98a8fc5ae4162275012db52dec79b5dc2be6641db4d4,2024-09-27T16:35:46.740000
CVE-2024-8664,0,0,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000
CVE-2024-8665,0,0,f6c99a5ec710565eecc74e7ed4fc9df52dc9e331e2cca577b8f47d511b3aa870,2024-09-27T16:59:28.437000
CVE-2024-8667,1,1,a6bfe149ce9bbeb25531dfd095df26e8190e908972c7301d1ff108e329663da5,2024-10-24T08:15:02.430000
CVE-2024-8668,0,0,90710183c7816e44ddec8f6349762659d94ce20b0ef640d6ca49967da8f41533,2024-10-07T17:28:08.987000
CVE-2024-8669,0,0,a540528fa4f0bbb5defe17259c589787942e6df5d18ff3bf79d91bf53c9aac43,2024-09-27T16:08:15.487000
CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000
@ -266222,6 +266225,7 @@ CVE-2024-8713,0,0,83e5cc73079f308b101a704f144a5b41b482803341d183db1c76abb1d6f85d
CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000
CVE-2024-8715,0,0,f0a4fb777a1271394a60c2f9ce37f6ba7325c02d49be07fd888bdf4eaa659dd6,2024-10-01T14:37:08.807000
CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000
CVE-2024-8717,1,1,ab286776a2ef5e66b95de7fdfcb42d96990ad7fedaed84704d6cae0b01c3b94e,2024-10-24T09:15:03.697000
CVE-2024-8718,0,0,c97741d12130ad5ba2ed82c528ec11a1af21fad86435451da12c39cec028d14f,2024-10-04T13:51:25.567000
CVE-2024-8719,0,0,744fcf7d72ab5bacabdfb2f8067ccc8eaf21212ff78af93f44b80439bd89826e,2024-10-18T12:53:04.627000
CVE-2024-8720,0,0,2f0e821428fb20df24eeb1115d6165ec35266f54d9cfaa09a98cadbec3449fde,2024-10-04T13:51:25.567000
@ -266675,6 +266679,7 @@ CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0
CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000
CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000
CVE-2024-9530,0,0,c8501e0bb039e166d52c4ac8c3106fb221a4406a702b0c3915afb70bff44dc96,2024-10-23T15:12:34.673000
CVE-2024-9531,1,1,a0ea00152446b09db8ce334c5df069da72f5c871a46bfbb95e4255717843e546,2024-10-24T08:15:02.663000
CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000
CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000
@ -266813,8 +266818,8 @@ CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df5
CVE-2024-9861,0,0,ea3da873230376cd14799b0d170e8e876683f20c285aa64f3bb5d67920c38493,2024-10-18T12:53:04.627000
CVE-2024-9862,0,0,a125c015e3b00c8735ed8c9687686a16a9d40d9b6f2ce90b19ff292bf536d9b9,2024-10-18T12:53:04.627000
CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389f4,2024-10-18T12:53:04.627000
CVE-2024-9864,1,1,ed4bb32f7ccba07250ea60d90abd733bee150fd7274c36de00b410e6eb7ee0d6,2024-10-24T07:15:02.310000
CVE-2024-9865,1,1,3b3858ba53b1464f281dbcaf0c38d3486f6c55a2286b54a15778cb228c16d68e,2024-10-24T07:15:02.987000
CVE-2024-9864,0,0,ed4bb32f7ccba07250ea60d90abd733bee150fd7274c36de00b410e6eb7ee0d6,2024-10-24T07:15:02.310000
CVE-2024-9865,0,0,3b3858ba53b1464f281dbcaf0c38d3486f6c55a2286b54a15778cb228c16d68e,2024-10-24T07:15:02.987000
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000
CVE-2024-9888,0,0,de5de1e3177c72ea1d0a5d19aa48b1693390bd1baf1f85524c962ffa2c18433f,2024-10-16T16:38:14.557000
@ -266852,6 +266857,7 @@ CVE-2024-9927,0,0,96920f248127734453deaf748492c280118aa5ea5b9c599a9138ad17f83910
CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000
CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000
CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
CVE-2024-9943,1,1,7b0c1393f06c87b367988fd60e468125695c3d2fea4b4705208f1920763ee357,2024-10-24T08:15:02.920000
CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
CVE-2024-9947,0,0,6d7ad994cc9a7fac36825c8cc7c424fb9dcf9e1f8fd3a9311a9b488ef62fd2d0,2024-10-23T15:12:34.673000
CVE-2024-9949,0,0,809d1c3ab15f5e798ce5cb068f046ea68c92b35fa3cdf8747557251b5a8ea50c,2024-10-23T18:15:13.763000

Can't render this file because it is too large.